RFID and Information Security in Supply Chains

Information visibility is of paramount importance for effective and efficient operation of supply chains. Although not the sole enabling technological source for information visibility in supply chains, RFID tags naturally allow for its seamless operationalization. RFID tags are notorious on issues related to security/privacy concerns, and these concerns are magnified in a supply chain context where the ownership of any given tag is passed among disparate organizations throughout its lifetime. We consider this scenario from a cryptographic perspective. We consider the literature in this area, identify vulnerabilities in an existing authentication protocol, and suggest modifications that address these vulnerabilities.

[1]  H. Nachtmann,et al.  SUPPLY CHAIN INFORMATION SHARING IN A VENDOR MANAGED INVENTORY PARTNERSHIP , 2004 .

[2]  Yingjiu Li,et al.  Protecting RFID communications in supply chains , 2007, ASIACCS '07.

[3]  Ari Juels,et al.  "Yoking-proofs" for RFID tags , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[4]  Zeng Yan Vendor-managed Inventory in Supply Chain , 2002 .

[5]  Selwyn Piramuthu,et al.  Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[6]  Diane M. Phillips,et al.  TWENTY YEARS OF JBL: AN ANALYSIS OF PUBLISHED RESEARCH , 1999 .